Submit #727214: Sangfor Operation and Maintenance Management System (OSM / 运维安全管理系统) 3.0.8 OS Command Injectioninfo

TitleSangfor Operation and Maintenance Management System (OSM / 运维安全管理系统) 3.0.8 OS Command Injection
DescriptionA critical Remote Command Execution (RCE) vulnerability exists in the Sangfor Operation and Maintenance Management System (OSM) version 3.0.8. The vulnerability is located in the /isomp-protocol/protocol/getCmd endpoint. The application fails to properly sanitize the sessionPath parameter in an HTTP POST request. Specifically, the WriterHandle.getCmd() method retrieves the user-supplied sessionPath and passes it to WriterHandle.getCmd(), which directly concatenates the parameter into a shell command string without sufficient validation or escaping. This string is then executed by ShellExecutor.service().exe(). An unauthenticated remote attacker can exploit this vulnerability by injecting shell metacharacters (e.g., ;) into the sessionPath parameter to execute arbitrary system commands with the privileges of the web server (typically root or tomcat).
Source⚠️ https://github.com/master-abc/cve/issues/12
User
 nestor233 (UID 94006)
Submission12/30/2025 05:40 PM (1 month ago)
Moderation01/09/2026 06:12 PM (10 days later)
StatusAccepted
VulDB entry340346 [Sangfor Operation and Maintenance Management System up to 3.0.8 getCmd WriterHandle.getCmd sessionPath os command injection]
Points20

Want to stay up to date on a daily basis?

Enable the mail alert feature now!